npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
Before and during ransomware execution, adversaries establish C2 channels, exfiltrate data, and download encryption keys. This skill analyzes Zeek conn.log and NetFlow data to detect beaconing patterns (regular-interval callbacks), connections to known TOR exit nodes, large outbound data transfers, and suspicious DNS activity associated with ransomware families.
Analyzes Zeek conn.log and NetFlow data to detect ransomware indicators: C2 beaconing, TOR connections, data exfiltration, DNS patterns, and risk scoring.
Analyzes Zeek conn.log and NetFlow data to detect ransomware indicators: C2 beaconing patterns, TOR exit node connections, data exfiltration, and encryption key exchanges.
Analyzes Zeek conn.log connection intervals for C2 beaconing patterns using ZAT to load data into Pandas, computes inter-arrival time std dev, flags low-jitter beacons for threat hunting.
Share bugs, ideas, or general feedback.
Before and during ransomware execution, adversaries establish C2 channels, exfiltrate data, and download encryption keys. This skill analyzes Zeek conn.log and NetFlow data to detect beaconing patterns (regular-interval callbacks), connections to known TOR exit nodes, large outbound data transfers, and suspicious DNS activity associated with ransomware families.